Which three actions should you perform?
You manage a cloud service that has a web application named WebRole1. WebRole1 writes error messages to the Windows Event Log. Users report receiving an error page with the following message: "Event 26 has occurred. Contact your system administrator." You need to access the WebRole1 event log. Which three actions...
What do you think is a correct statement about the limitations of Amazon SQS?
You are architecting an auto-scalable batch processing system using video processing pipelines and Amazon Simple Queue Service (Amazon SQS) for a customer. You are unsure of the limitations of SQS and need to find out. What do you think is a correct statement about the limitations of Amazon SQS?A . It supports an...
Which of the following best describes the Integrated Information Infrastructure Reference Model?
Which of the following best describes the Integrated Information Infrastructure Reference Model?A . It can be used to determine the capability level of an enterpriseB . It is a deliverable from Phase AC . It is an Application Architecture Reference Mode!D . It provides a conceptual structure for architecture governanceE...
Which HSRP parameters must match, to ensure proper functionality?
Which HSRP parameters must match, to ensure proper functionality?A . group parametersB . priority parametersC . preempt parametersD . tracking parametersView AnswerAnswer: A
Which action accomplishes this task?
An access switch at a remote location is connected to the spanning-tree root with redundant uplinks. A network engineer notices that there are issues with the physical cabling of the current root port. The engineer decides to force the secondary link to be the desired forwarding root port. Which action...
Which of the following act requires employer’s standard national numbers to identify them on standard transactions?
Which of the following act requires employer’s standard national numbers to identify them on standard transactions?A . SOXB . HIPAAC . DMCAD . PCI-DSSView AnswerAnswer: B
Which of the following should Kim enable to ensure that the network only allows 802.11n clients?
Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?A . Name the SSID on the 802.11n network onlyB . Limit the DHCP address poolC . Disable 802.11b and 802.11gD . Only use WPA encryptionView...
How many Update Domains (UDs) and Fault Domains (FDs) should you create?
Topic 2, Exam Set B A company has an Azure subscription with four virtual machines (VM) that are provisioned in an availability set. The VMs support an existing web service. The company expects additional demand for the web service. You add 10 new VMs to the environment. You need to...
What is the cause?
Refer to the exhibit. A network engineer configures a Cisco Unified Communications Manager and VCS integration via a SIP trunk. Endpoint A is able to conduct video calls to Endpoint B. When Endpoint A attempts to share presentation content with Endpoint B, Endpoint B sees the presentation video on the...
When a vSphere Administrator powers on a VM with the following configuration, what will be the resulting swap file size?
When a vSphere Administrator powers on a VM with the following configuration, what will be the resulting swap file size? A . 4 GBB . 2 GBC . 3 GBD . 1 GBView AnswerAnswer: B